In a distributed cloud environment, a collecting agent deployed external to a kernel of a compute host collects network data packets describing various raw events communicated between compute instances of the environment and metadata associated with the events from various sources. The collecting agent communicates the metadata to a cloud application. The collecting agent also communicates the packets to a stream processor that is decoupled from the collecting agent. The stream processor processes the packets in a stateful manner to generate a set of time series data. The time series data is communicated to the cloud application, where a set of enhanced time series data is generated by merging the time series data with the metadata in a distributed manner. A topology map describing the compute instances of the distributed cloud environment is then generated based on the set of enhanced time series data. The topology map is then displayed.
|
1. A method, comprising:
collecting, at a service monitoring instance, network traffic comprising multiple packets communicated between multiple services distributed across a distributed cloud environment, at least two of the multiple services corresponding to a single cloud application, wherein the multiple packets from respective services of the multiple services to different respective services of the multiple services are captured by multiple collectors and forwarded to the monitoring service instance;
determining a network flow of some or all of the network traffic at least by reconstructing a request and a response to the request based at least in part upon the multiple packets;
generating a topology map based at least in part upon the network flow of the network traffic between the multiple services distributed across the distributed cloud environment at least by:
querying the network flow;
receiving query results representing at least multiple instances of code that correspond to a service of the single cloud application; and
grouping a portion of the query results corresponding to the multiple instances of code that correspond to the service based on a protocol type or a resource type; and
generating a display output of the topology map comprising at least at least a visual representation of the multiple instances of code comprising the service grouped based on a protocol type or a resource type.
9. A system, comprising:
a processor;
a memory for holding a set of instructions, which when executed by the processor causes a set of acts comprising:
collecting, at a service monitoring instance, network traffic comprising multiple packets communicated between multiple services distributed across a distributed cloud environment, at least two of the multiple services corresponding to a single cloud application, wherein the multiple packets from respective services of the multiple services to different respective services of the multiple services are captured by multiple collectors and forwarded to the monitoring service instance;
determining a network flow of some or all of the network traffic at least by reconstructing a request and a response to the request based at least in part upon the multiple packets;
generating a topology map based at least in part upon the network flow of the network traffic between the multiple services distributed across the distributed cloud environment at least by:
querying the network flow;
receiving query results representing at least multiple instances of code that correspond to a service of the single cloud application; and
grouping a portion of the query results corresponding to the multiple instances of code that correspond to the service based on a protocol type or a resource type; and
generating a display output of the topology map comprising at least at least a visual representation of the multiple instances of code comprising the service grouped based on a protocol type or a resource type.
17. A computer program product embodied on a non-transitory computer readable medium having stored thereon a sequence of instructions which, when executed by a processor causes a set of acts comprising:
collecting, at a service monitoring instance, network traffic comprising multiple packets communicated between multiple services distributed across a distributed cloud environment, at least two of the multiple services corresponding to a single cloud application, wherein the multiple packets from respective services of the multiple services to different respective services of the multiple services are captured by multiple collectors and forwarded to the monitoring service instance;
determining a network flow of some or all of the network traffic at least by reconstructing a request and a response to the request based at least in part upon the multiple packets;
generating a topology map based at least in part upon the network flow of the network traffic between the multiple services distributed across the distributed cloud environment at least by:
querying the network flow;
receiving query results representing at least multiple instances of code that correspond to a service of the single cloud application; and
grouping a portion of the query results corresponding to the multiple instances of code that correspond to the service based on a protocol type or a resource type; and
generating a display output of the topology map comprising at least at least a visual representation of the multiple instances of code comprising the service grouped based on a protocol type or a resource type.
2. The method of
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
generating, in response to a first request to view an analytic for a service of the multiple services or a link between a pair of services of the multiple services, the analytic based at least in part upon a result of querying the network flow.
10. The system of
11. The system of
12. The system of
13. The system of
14. The system of
15. The system of
16. The system of
generating, in response to a first request to view an analytic for a service of the multiple services or a link between a pair of services of the multiple services, the analytic based at least in part upon a result of querying the network flow.
18. The computer program product of
19. The computer program product of
20. The computer program product of
21. The computer program product of
22. The computer program product of
23. The computer program product of
24. The computer program product of
generating, in response to a first request to view an analytic for a service of the multiple services or a link between a pair of services of the multiple services, the analytic being based at least in part upon a result of querying the network flow.
|
The present application claims the benefit of priority to U.S. patent application No. 62/489,841, titled “SYSTEMS AND METHODS FOR NETWORKED MICROSERVICE MODELING AND VISUALIZATION,” filed on Apr. 25, 2017, which is hereby incorporated by reference in its entirety. This application is related to U.S. patent application Ser. No. 15/963,082, titled “SYSTEMS AND METHODS FOR NETWORKED MICROSERVICE MODELING,” filed concurrently herewith, which is hereby incorporated by reference in its entirety.
This disclosure relates to the field of cloud application lifecycle management and, more specifically, to automated systems and methods for modeling and visualization of interactivity among microservices across a network.
Cloud applications and software architectures have experienced a shift from traditional monolithic architectures to microservices. Modern cloud applications based on microservices are characterized by multi-level architectures and deployments. Each user request to interact with a business application is realized through complex coordination among many services. A service may be defined as a logical grouping of functionally-equivalent instances within an application.
With a shift from the traditional monolithic architectures to microservices in modern cloud applications, the complexity of monitoring the services in an application has increased manifold. When migrating from traditional architectures to microservices architectures, monolithic applications typically are broken down into hundreds or even thousands of smaller, cohesive, functional microservices. To ensure reliability and performance of API-centric, service-oriented cloud applications, Site Reliability Engineers (SREs) and software DEVelopment and information technology OPerationS (DevOps) teams need to monitor the interactions between various microservices. As a matter of definition, DevOps refers to a set of practices that emphasize the collaboration and communication of both software developers and information technology (IT) professionals while automating the process of software delivery and infrastructure changes.
Application monitoring techniques for cloud applications may be categorized based on two dimensions. Traditional monitoring approaches involve instance-level monitoring (or diagnostic-oriented monitoring) in which logs and metrics from individual instances (e.g., application code, virtual machines, containers) and underlying hardware components are gathered. Service-level monitoring (or objective-oriented monitoring) involves grouping of functionally equivalent instances and tracking the service-level objectives (SLOs). The instance-level and service-level monitoring approaches can further be categorized into white-box or black-box techniques depending on whether they require changes to the application code or not. White-box monitoring approaches require code changes and common white-box techniques include log-based monitoring, Application Performance Management (APM), code instrumentation for collecting custom metrics and distributed tracing techniques. Black-box monitoring approaches do not involve changes to the code and common black-box techniques either leverage operating system-based insights or network communications to gain insights into services and applications.
Traditional application monitoring solutions designed for monolithic software architectures rely on logs or call stacks as a source of truth. In monolithic applications, the monitoring complexity is related to interactions inside the application code. Conversely, in microservices-based applications, this complexity shifts to interactions between services over the network. Consequently, the traditional code-embedded and log-centric monitoring tools are no longer effective for monitoring service-oriented cloud applications. One of the fundamental challenges of monitoring the health and performance of modern cloud applications is that of achieving visibility into all the services, APIs, and databases that make up an application.
Modern applications leverage a lot of external API services such as Google Auth®, Stripe®, and Salesforce®. Oftentimes, such external services can be the root cause of cloud-based application execution issues. Traditional code-embedded and log-based monitoring solutions are of limited use for monitoring external services, as they do not capture any information on external service interactions.
As described above, the breakdown of monolithic applications into hundreds or even thousands of smaller, cohesive, functional microservices shifts the monitoring complexity from interactions inside code to interactions over a network. Function calls within the code in monoliths have been replaced by calls going over the network in microservices. For example, the state of every request must be transferred from one service to another to build a response. The result is an explosion of chatter such as API calls, remote procedure calls (RPCs), database calls, memory caching calls, and the like. Due to this shift in complexity from the code to the interactions over the network, monitoring solutions that rely on logs or code instrumentation have become less effective for microservices-based architecture. The critical information that SREs and DevOps need to monitor is no longer the code inside a microservice, but instead is the interactions between various microservices.
Due to the breakdown of monolithic applications into a large number of functional microservices, the white-box monitoring approaches have become too complex to manage. Since modern applications use a plethora of languages and frameworks, white-box approaches need to continuously evolve to support new programming languages and frameworks.
Additionally, even if traditional application monitoring solutions were capable of monitoring traffic between microservices, traditional mapping products may not support visualization of the traffic. The reason for this is that traditional application monitoring solutions may only support applications that have three layers (e.g., an infrastructure layer, and instances layer, and a services layer) and often require inputs corresponding to the layers (e.g., an application ID, an instance ID, and a service ID,) to be provided before generating maps based on the inputs. However, modern cloud applications based on microservices may include any arbitrary number of user-defined layers that may overlap with each other. For example, layers within a cloud application may include a bare metal hardware layer having a virtualization layer on top; within the virtualization layer, there may be availability zones within a data center and guest virtual machines that are running containers on top of the virtualization layer, etc. Therefore, since traditional mapping products require inputs corresponding to the three layers described above, the maps that they generate are static and are unable to reflect any additional and/or overlapping layers.
Moreover, mapping products must be agile and capable of updating their maps dynamically to reflect changes in network traffic. For example, since virtual machines may come and go, mapping products used to visualize traffic between a virtual machine and other compute instances must be able to dynamically update their maps to indicate if the virtual machine is or is not present. As an additional example, since relationships between compute instances are ephemeral in that the relationships only exist for as long as the compute instances are communicating with each other, mapping products used to visualize these relationships must also reflect changes in these relationships. As noted above, since the maps that traditional mapping products generate are static because they may only support applications having three layers, they may be unable to reflect any changes within additional and/or overlapping layers.
Therefore, there is a need for an improved method, system, and computer program product to implement networked microservice modeling and visualization.
This background information is provided to reveal information believed by the applicant to be of possible relevance to embodiments of the present invention. No admission is necessarily intended, nor should it be construed, that any of the preceding information constitutes prior art against embodiments of the present invention.
The disclosed embodiments provide an improved approach for networked microservice modeling and visualization in a distributed cloud environment. In particular, the present disclosure describes a system, method, and computer program product that can model and visualize networked microservices in a distributed cloud environment. The distributed cloud environment is characterized by a distributed architecture in which a lightweight collecting agent (a “collector”) that is deployed external to a kernel of a compute instance collects network data packets communicated between compute instances of the distributed cloud environment describing various raw events, as well as metadata associated with the raw events. The collector may collect the packets and metadata from various sources (e.g., Packet Capture Protocol (PCAP), Remote Packet Capture Protocol (RPCAP), Remote Switch Port Analyzer (RSPAN), Extended Berkeley Packet Filter (eBPF), a proxy (e.g., SSLsplit), cloud APIs, a host operating system, a hypervisor, events, etc.). The metadata is communicated by the collector to a cloud service while the packets are communicated to a first stream processor that is decoupled from the collector. The first stream processor processes the packets in a stateful manner and generates a set of time series data from the packets. The collector communicates the time series data to the cloud service to which the metadata was communicated, where a set of enhanced time series data is generated by merging the time series data with the metadata in a distributed manner. A topology map describing the compute instances of the distributed cloud environment is generated by a topology module based on the set of enhanced time series data. The topology map is then presented.
The topology module may generate the topology map in response to receiving a set of inputs including a time window. The set of inputs also may include a set of filter parameters and/or a set of group by parameters. Once the topology module has received the set of inputs, the topology module may query the set of enhanced time series data based on the set of inputs and identify a subset of the enhanced time series data corresponding to the time window. The topology module also may filter and or group the subset of the enhanced time series data based on the set of filter parameters and/or the set of group by parameters. Upon receiving a set of query results, the topology module may generate the topology map based on the results, and display the topology map.
In some embodiments, once the topology map has been displayed, a request to view a set of analytics for a node or a link within the topology map may be received. Upon receiving the request, the topology module may query the set of enhanced time series data based at least in part on the request, identify a subset of the enhanced time series data corresponding to the node/link, and receive a set of query results corresponding to the subset of the identified data. The topology module also may identify the subset of the enhanced time series data based on a set of inputs (e.g., a time window, one or more filter parameters and/or one or more group by parameters). The topology module may then generate a user interface including analytics for the node/link and display the user interface.
Further details of aspects, objects and advantages of the invention are described below in the detailed description, drawings, and claims. Both the foregoing general description and the following detailed description are exemplary and explanatory, and are not intended to be limiting as to the scope of the invention.
The drawings illustrate the design and utility of embodiments of the present invention, in which similar elements are referred to by common reference numerals. In order to better appreciate the advantages and objects of embodiments of the invention, reference should be made to the accompanying drawings. However, the drawings depict only certain embodiments of the invention, and should not be taken as limiting the scope of the invention.
Embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which preferred embodiments of the invention are shown. The invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Those of ordinary skill in the art realize that the following descriptions of the embodiments of the present invention are illustrative and are not intended to be limiting in any way. Other embodiments of the present invention will readily suggest themselves to such skilled persons having the benefit of this disclosure. Like numbers refer to like elements throughout. Although the following detailed description contains many specifics for the purposes of illustration, anyone of ordinary skill in the art will appreciate that many variations and alterations to the following details are within the scope of the invention. Accordingly, the following embodiments of the invention are set forth without any loss of generality to, and without imposing limitations upon, the invention.
In this detailed description of embodiments of the present invention, a person skilled in the art should note that directional terms, such as “above,” “below,” “upper,” “lower,” and other like terms are used for the convenience of the reader in reference to the drawings. Also, a person skilled in the art should notice this description may contain other terminology to convey position, orientation, and direction without departing from the principles of embodiments of the present invention.
Furthermore, in this detailed description, a person skilled in the art should note that quantitative qualifying terms such as “generally,” “substantially,” “mostly,” and other terms are used, in general, to mean that the referred to object, characteristic, or quality constitutes a majority of the subject of the reference. The meaning of any of these terms is dependent upon the context within which it is used, and the meaning may be expressly modified.
With the above background information and problems with prior art in mind, certain embodiments of the present invention are related to a method and system for auto-discovering service instances and behavioral resources on services in cloud applications.
As noted above, due to the shift from traditional monolithic architectures to microservices architectures in modern cloud applications, monitoring solutions have shifted their focus from monitoring application code to monitoring network communications among various microservices. However, the shift to microservices from monolithic architectures has resulted in a higher volume of network traffic, making it difficult to process network traffic at low latency. Furthermore, the shift has also resulted in arbitrary numbers of possibly overlapping layers (e.g., multiple overlapping virtualization layers), making it difficult to visualize network traffic.
To address the complexities of monitoring microservices in modern cloud applications, an embodiment of the invention, as shown and described by the various figures and accompanying text, provides a system and associated methods for collecting network interactions in real-time and uses them as the source of truth for application observability and visualization. For example, and without limitation, to capture live service interactions, a system aspect of embodiments of the present invention may comprise data collectors which may be used to capture network interactions (such as API calls, RPC calls, database calls, or interactions with external services or PaaS services) between available services and APIs in real-time. Without instrumenting the application code and by looking at the network as the source of truth, the data collectors may be able to capture the interactions between microservices (such as API calls, RPCs, database calls, and memory caching calls). Another embodiment of the invention provides a system and associated methods for reconstructing application context from raw network packets in real-time.
In embodiments in which one or more compute instances correspond to virtual machines, a virtual machine or “VM” refers to a specific software-based implementation of a machine in a virtualization environment, in which the hardware resources of a real computer (e.g., CPU, memory, storage, etc.) are virtualized or transformed into the underlying support for a fully functional VM that can run its own operating system and applications on the underlying physical resources, just like a real computer. Virtualization works by inserting a thin layer of software directly on the computer hardware or on a host operating system. This layer of software contains a VM monitor or “hypervisor” that allocates hardware resources dynamically and transparently.
As shown in
The collectors 110 may employ a variety of interaction capture and tracing methods. In some embodiments, to capture network packets 114 related to API interactions, the collectors 110 may make use of Remote Packet Capture Protocol (RPCAP) forwarders. The RPCAP forwarders may run in user space and may sniff network traffic, make a copy of the packets 114, and send them to a stream processor (e.g., Stream Processor 1 120, described below). The collectors 110 may allow the option to set a Berkeley Packet Filter (BPF), sampling rate, maximum transmission unit (MTU) size, and the interface for packet capture. In various embodiments, to get visibility into HTTP Secure (HTTPS) traffic in a secure manner, the collectors 110 may use SSLsplit which acts as a user-space local proxy in the traffic path. SSLsplit uses IP-Table rules with NAT redirection to enable capture of SSL traffic. The collectors 110 may capture SSL traffic on the client side of the SSL stream (i.e., on the nodes initiating the SSL traffic). To preserve end-to-end encryption, a user-generated certificate may be used to encrypt traffic between the app and the locally-running SSLsplit proxy.
As the metadata 112 is collected by each collector 110 in real-time, the collector 110 communicates the metadata 112 to a cloud service 140. At the cloud service 140, the metadata 112 may be stored as key-value pairs in a configuration and discovery database 142. For example, if each record stored in the configuration and discovery database 142 has a field called “IP address” corresponding to a key, the content of the field is its value for each particular record (e.g., an IP address of 69.89.31.226). The configuration and discovery database 142 is synchronized to one or more second stream processors (Stream Processor 2 130) in the cloud service 140. The metadata 112 may be retrieved from the configuration and discovery database 142 by a second stream processor 130 and merged with a set of time series data 128, as further described below.
As the packets 114 are collected by each collector 110 in real-time, the collector 110 communicates the packets 114 over a network to one or more first stream processors (Stream Processor 1 120) for stateful processing. Since an interface (i.e., the network) exists between each first stream processor 120 and each collector 110 from which it may receive packets 114, the first stream processors 120 are decoupled from the collectors 110, such that a first stream processor 120 may be local to a collector 110 from which it receives packets 114 or remote from the collector 110 (e.g., in the same or a different data center 100). Because processing is offloaded by the collectors 110 onto external stream processors (i.e., the first stream processors 120, which are outside the critical path), central processing unit (CPU) and memory usage of the capture agents (i.e., the collectors 110) may be negligible, allowing for the processing to be scaled out and performed in a distributed manner.
In some embodiments, the distributed cloud environment and/or one or more data centers 100 within the distributed cloud environment may include multiple first stream processors 120. In such embodiments, each collector 110 may communicate the packets 114 it has collected to a first stream processor 120 to which it is assigned. For example, suppose that a session is established between two containers that are communicating with each other and that a collector 110 that collects packets 114 for this session is assigned to a first stream processor 120. In this example, once the first stream processor 120 begins receiving packets 114 from the collector 110 for this session, all subsequent packets 114 for this session will be sent by the collector 110 to the same first stream processor 120. In some embodiments, each first stream processor 120 may store various types of information identifying each session for which it is receiving packets 114 (e.g., a session ID or other unique identifier associated with each session, information describing types of statements or queries sent during each session, etc.).
Although not depicted in
Each first stream processor 120 processes the packets 114 it receives in a stateful manner to reassemble application protocols (e.g., HTTP, MySQL, GRPC, etc.) and to analyze the transactions that are running. In some embodiments, prior to processing packets 114, a first stream processor 120 may buffer the packets 114 on a session basis to ensure that the packets 114 are processed in a stateful manner (e.g., if the packets 114 are received out of order, as further described below). A first stream processor 120 may generate a set of composite event logs 126 from the packets 114 it receives, in which each entry in the composite event logs 126 describes a transaction. The composite event logs 126 may include various values that describe the transactions (e.g., the duration of a transaction, the number of bytes sent in the transaction, etc.). For example, a first stream processor 120 may process thousands of packets 114 corresponding to a single query received from a collector 110 and generate a transaction log in a set of composite event logs 126 including one or more values describing the query (e.g., the amount of time required for a server to respond to the query, the number of bytes sent in response to the query, etc.). The set of composite event logs 126 may be stored at a first stream processor 120 in an in-memory database. In various embodiments, a first stream processor 120 may extract metadata 112 out of the packets 114 prior to generating the set of composite event logs 126.
Once a first stream processor 120 has generated a set of composite event logs 126, the first stream processor 120 may generate a set of time series data 128 that summarizes the set of composite event logs 126. The set of time series data 128 may describe network traffic, network metrics, or any other suitable streaming data that may be summarized. For example, a first stream processor 120 may generate a set of time series data 128 including multiple data points from a set of composite event logs 126, in which each data point summarizes the set of composite event logs 126 for each second within a span of time described by the set of composite event logs 126. Therefore, the volume of data included in a set of time series data 128 generated by each of the first stream processors 120 is orders of magnitude smaller than the volume of data included in the packets 114 from which the set of time series data 128 was generated. Stateful processing of packets 114 is further described below.
Each of the first stream processors 120 communicates a set of time series data 128 it generates to a cloud service 140 (e.g., over HTTP links) at which a second series of stream processing is performed by a second stream processor 130. As shown in
In addition to receiving a set of time series data 128 from one or more first stream processors 120, a second stream processor 130 also may retrieve metadata 112 stored in the configuration and discovery database 142 and enhance the set of time series data 128 with information included in the metadata 112 (e.g., VM hostname, service ID, username, etc.). The second stream processor 130 may enhance the time series data 128 using a metadata fuser 132 that merges the time series data 128 with the metadata 112 to generate a set of enhanced time series data 116. In some embodiments, the metadata fuser 132 may merge the time series data 128 with metadata 112 by correlating a set of attributes of the time series data 128 with a corresponding set of attributes of the metadata 112. For example, for a particular data point within a set of time series data 128 describing various metrics (e.g., latencies), the metadata fuser 132 may identify an IP address corresponding to the data point within a set of time series data 128 and map the IP address to a key-value pair included among the metadata 112 retrieved from the configuration and discovery database 142. In this example, if the IP address is associated with a VM name specified by an additional key-value pair, the metadata fuser 132 may associate the VM name with the data point as well. Thus, the enhanced time series data 116 corresponds to data points of the time series data 128 that have been enhanced with the metadata 112.
Once a set of enhanced time series data 116 has been generated, it may be stored in a multidimensional database 150. The enhanced time series data 116 may be stored in the multidimensional database 150 in a columnar fashion, in which each column corresponds to a feature or attribute of the enhanced time series data 116 (e.g., max values, mean values, standard deviations, etc.) and each row or record corresponds to a data point corresponding to a time interval (e.g., one second) within the enhanced time series data 116. In some embodiments, the multidimensional database 150 may be an Online Analytical Processing (OLAP) database (e.g., Druid) or any other suitable type of database that allows for the enhanced time series data 116 to be queried in real-time or near real-time.
Although illustrated as single databases, the databases (i.e., the configuration and discovery database 142 and/or the multidimensional database 150) may be composed of multiple separate databases. In such embodiments, the databases may be located in different physical locations and some of the databases may be accessible via a remote server. In some embodiments, the databases may include multiple tiers of storage in a storage pool. The storage may be accessible through a network, such as a networked storage (e.g., a SAN, NAS, etc.). The storage pool also may include one or more instances of local storage. Such local storage may include solid state drives (SSDs), hard disk drives (HDDs), and/or other storage devices.
The enhanced time series data 116 stored at the multidimensional database 150 may be queried using a topology module 160, which may receive queries or other types of inputs from one or more user stations 170. A user station 170 comprises any type of computing station that may be used to operate or interface with the topology module 160. Examples of such user stations 170 include, for example, workstations, personal computers, or remote computing terminals. A user station 170 comprises a display device, such as a display monitor, for displaying a user interface 175 to users at the user station 170. A user station 170 also comprises one or more input devices for a user to provide inputs to the topology module 160, such as a mouse or keyboard to manipulate a pointing object in a graphical user interface.
Based on the query results, the topology module 160 may generate a user interface 175 including a topology map 180 describing a topology of various compute instances within the distributed cloud environment. Examples of such compute instances include teams operating within a data center 100, services operating within the distributed cloud environment, containers within a set of data centers 100, pods (i.e., one or more containers located on the same host machine) within a data center 100, VMs operating within a team, etc. The topology map 180 also may describe relationships between the compute instances. For example, a topology map 180 may describe various metrics associated with interactions between compute instances (e.g., throughput, error rates, latency, etc.).
The topology module 160 may generate the topology map 180 based on a set of inputs originating from a user station 170. The set of inputs may specify a time window describing a span of time during which the topology map 180 of one or more compute instances within the distributed cloud environment is to be generated. The set of inputs also may specify a filter parameter that filters the compute instances included in the topology map 180 and/or a group by parameter that groups the compute instances included in the topology map 180. Once generated, the topology module 160 may communicate the user interface 175 including the topology map 180 to a user station 170 from which the set of inputs was received. For example, as shown in step 1 of
As noted above, each user request to interact with a business application is realized through complex coordination among many services 220. As also noted above, a service may be defined as a logical grouping of functionally-equivalent instances 230 within an application. Hence, services are a critical abstraction level in the application hierarchy. Services may comprise multiple instances 230 of code executing inside VMs 232, containers 234, or bare metal operating systems 238. As further described in
For example, and without limitation, some number of instances may be collectively configured to provide a Representational State Transfer (REST) service for an item list in a shopping cart 222. As a matter of definition, REST is an architectural style for networked hypermedia applications primarily used to build web services that are organized into resources (each of which comprises a chunk of related information, such as a user profile, a collection of updates, or a global user identifier). Each resource is identified by one or more Uniform Resource Identifiers (URIs). To access the resource, an application may call a Hypertext Transfer Protocol (HTTP) operation on one of the resource's URIs. In the example shown in
Applications having a monolithic architecture 250 have various drawbacks. A major drawback of the monolithic architecture 250 is that monolithic applications are difficult to scale and maintain. For example, since monolithic applications are built as a single unit having components that are designed to work together and which share resources and memory space, it is difficult to isolate individual services, making scaling monolithic applications challenging if different modules have resource requirements that conflict with each other. As an additional example, monolithic applications must be redeployed in their entirety upon each update. As yet another example, bugs in any module within a monolithic application may impact the application's availability.
In contrast, applications having a microservices architecture 260 are split into smaller logically independent microservices that are interconnected. Each microservice has its own business logic layer and database. Therefore, a change made to one microservice does not affect other microservices within a microservices architecture 260. In a microservices architecture 260, microservices may communicate with each other via messaging protocols (e.g., JMS or AMQP) and/or lightweight protocols (e.g., HTTP and REST).
The splitting of microservices applications into smaller services addresses several of the problems posed by monolithic applications. For example, since each microservice in a microservices architecture 260 is deployed independently, each microservice also may be scaled up or down independently of each other. As an additional example, each microservice may be developed discretely and updated/upgraded independently of each other. As yet another example, since microservices are interconnected, but logically independent of each other, dependencies between microservices are minimized, such that a bug in one microservice is unlikely to affect another microservice.
Network-centric approaches to monitoring microservices may involve the use of collecting agents that collect information describing network traffic and additional components that subsequently process the collected information. Examples of such collecting agents are illustrated in
In contrast,
As shown in
As described above, once a collector 110 in the distributed cloud environment has collected packets 114 describing raw events and metadata 112 associated with the raw events (in step 300), the set of time series data may be generated by stateful processing of the packets 114 (in step 302). To process the packets 114 in a stateful manner, the packets 114 are communicated to a remote or local first stream processor 120 (in step 400). As also described above, in some embodiments, a data center 100 may include multiple first stream processors 120, in which each collector 110 communicates the packets 114 it has collected to a first stream processor 120 to which it has been assigned. For example, as shown in
Referring back to
The first stream processor 120 may make use of dataflow pipelines 554 which may be compactly expressed in a declarative rule-based language. The declarative rule-based language may include constructs for modularization and components, interoperability with legacy code, and runtime support for parallelism. The declarative rule-based language may be used to specify a linear pipeline 554 of components, where each component corresponds to a specific stage in the analysis pipeline 554. To execute these pipelines 554 efficiently, the first stream processor 120 may provide fine-grained parallelism at the level of individual components within the pipelines 554. This parallelism may be achieved through the use of a threading library based on a task-stealing model that may achieve both automatic load-balancing and high throughput processing.
Once the service-level interactions captured by the collectors 110 from the network have been shipped to a first stream processor 120, the first stream processor 120 may follow protocol state machines and may track every service interaction in an in-memory database. This on-the-fly analysis approach advantageously may be more scalable and real-time compared to the ‘store-first, analyze later’ approach of log file analysis. The first stream processors 120 may be horizontally scalable and may have multi-core capabilities that may allow them to analyze tens of thousands of service interactions per second. This framework-agnostic interaction analysis may allow the system to be a broad coverage solution, as any service that talks over the network may be tracked.
A first stream processor 120 may accept network events 510 as input to each dataflow pipeline 554 that could either be external (e.g., packet capture from the network) or internal (e.g., local periodic events). The events may be queued 530 and scheduled by the platform threads 540, which may generate a continuous stream of tuples 544 from the incoming events 510 and may insert them into the pipelines 554 for execution.
A method aspect of embodiments of the present invention may include a token-based scheduling mechanism used within a first stream processor 120. Each incoming tuple 544 may be assigned a token number by a token dispenser 552 and then may be scheduled for running within the dataflow pipeline 554. Each pipeline 554 may have its own token dispenser 552. At any time, only a pre-specified number of tokens may be allocated for each pipeline 554, hence limiting the number of in-flight tuples in the pipeline 554. Once tuples are assigned a token number, they then may be processed within the dataflow pipeline 554. For example, and without limitation, the first stage in the pipeline 554 is an input component. All components may be executed using a task-stealing framework 556, in which a common pool of general-purpose task-stealing threads 556 capable of performing any tasks may steal tasks from each other during processing to achieve load-balancing. As input tuples 544 traverse each component at every processing stage, output tuples 564 (also called action tuples) may be generated and buffered for processing in the next component. Based on the ordering semantics of each component, each buffered tuple ready for processing may be designated a ready task, and enqueued into task queues 558. Each task queue 558 may be assigned to a task-stealing thread 556 running on a processing core, which may dequeue the task from its assigned task queue 558 for processing. In a multicore system, these threads may run in parallel, hence allowing multiple tuples to be processed in parallel within the pipelines 554. This characteristic may advantageously enable concurrent processing within each component (for different incoming tuples 544), or processing stages within a pipeline 554 to run in parallel. In the event of overload due to high traffic load, packets 114 included in incoming network traffic 510 may be dropped by a packet capture thread 522. However, once a packet 114 is accepted into the event queue 530, the first stream processor 120 may ensure that this packet 114 will be processed. At the final stage of the pipeline 554, output action tuples 564 may be generated and may be advantageously used to perform specific actions 560, including (1) shipping the tuples 574 into another pipeline 554 (at the same or remote node) for further processing, (2) redirecting tuples 574 to a router controller for making traffic management decisions (e.g., rate limit or block a particular flow), (3) materializing into tables as traffic statistics, or (4) raising alarms for the user.
Referring now to
Referring now to
Although not depicted in
Furthermore, although not depicted in
As shown in
The composite event logs 126 may include attributes of each transaction. For example, suppose that two services communicate with each other 100,000 times per second (i.e., 100,000 API calls are being made per second). In this example, for each of those 100,000 calls, a composite event log 126 is generated in memory, in which each log identifies a corresponding transaction, the type of request that was made, the time at which it was made, an IP address and a name of a VM from which each request was made, etc. As shown in the example of
Once a set of composite event logs 126 have been generated by a first stream processor 120, the first stream processor 120 may generate a set of time-series data 128 from the set of composite event logs 126. In some embodiments, a set of time series data 128 corresponds to a set of data points for equally-spaced time intervals within a time span covered by a set of composite event logs 126. For example, if a set of composite event logs 126 describes transactions occurring over a time span of one minute, each data point within a set of time series data 128 generated from the set of composite event logs 126 may correspond to a one-second interval within the one-minute time span. Therefore, in contrast to a set of composite event logs 126, which are associated with times that are not regularly spaced, a set of time series data 128 is spaced at regular intervals.
A first stream processor 120 may generate a set of time series data 128 from a set of composite event logs 126 by summarizing the set of composite event logs 126 at regularly-spaced time intervals within a time span covered by the set of composite event logs 126. In some embodiments, a data point within a set of time series data 128 may summarize a set of composite event logs 126 for a respective time interval as one or more counts, standard deviations, maximum and minimum values, etc. For example, if the same query is executed multiple times and the same result is obtained, execution of the queries is summarized into a single data point associated with a count of five. In this example, if two different results were obtained for the queries, two different data points are generated, each of which is associated with a count indicating a number of times that a respective result was obtained. Examples of types of information that may be summarized by the time series data 128 include counts (e.g., of transactions), a duration of the transactions, the number of bytes sent on each transaction, or any other suitable types of information that would allow data describing microservices in a distributed cloud environment to be sliced and diced in arbitrary ways once it is stored in the multidimensional database 150 and queried.
As shown in
While at the input of the first stream processors 120, the complexity may be O(Number of measurements or data points collected), and while at the output of the first stream processors 120, this complexity may be reduced to O(Number of monitoring dimensions), as the first stream processors 120 may produce per-second rolled-up time series of metrics. These results including, for example, and without limitation, per-second rolled-up time series data 128 and composite event logs 126, may be routed to a wide variety of downstream consumers. By decoupling collection from stream processing, the system may be able to advantageously track short-lived instances in highly chaotic environments as these instances export packets 114 and network interactions data in real-time rather than exporting aggregated metrics. Therefore, the chaos is “absorbed” in the stream processing layer. Furthermore, since the volume of data included in a set of time series data 128 generated by each of the first stream processors 120 is orders of magnitude smaller than the volume of data included in the packets 114 from which the set of time series data 128 was generated, the described approach for networked microservice modeling in a distributed cloud environment may be scalable across multiple clouds.
As described above, once a set of time series data 128 has been generated by stateful processing of packets 114 by a first stream processor 120 (in step 302), a set of enhanced time series data 116 may be generated by merging the time series data 128 with metadata 112 in a distributed manner (in step 304). As also described above, metadata 112 collected by each collector 110 within a data center 100 is communicated to the cloud service 140 (in step 700), where it may be stored (in step 702) as key-value pairs in the configuration and discovery database 142 for later retrieval and merging. For example, as shown in the example of
Referring again to
In some embodiments, after the time series data 128 has been generated by stateful processing of the packets 114 by the first stream processor 120 (in step 302), the enhanced time series data 116 may be generated by merging the time series data 128 with the metadata 112 (in step 304) based on updates to the metadata 112. In such embodiments, updates to the metadata 112 are received at a collector 110 (in step 710). In some embodiments, the update to the metadata 112 is received at the collector 110 in response to a triggering event received from a source 105 (e.g., information received from a host operating system 105g indicating that a change has occurred). For example, as shown in
Referring again to
Referring back to
Referring once more to
As described above, once a set of enhanced time series data 116 has been generated by merging the time series data 128 with metadata 112 in a distributed manner (in step 304), a topology map 180 may be generated using the set of enhanced time series data 116 (in step 306). As also described above, the topology map 180 may be generated by the topology module 160, which queries the enhanced time series data 116 stored in the multidimensional database 150 and generates a user interface 175 including the topology map 180 based on the query results. The topology module 160 may generate the topology map 180 in response to receiving a set of inputs from a user station 170 (in step 900). The set of inputs includes a time window describing a span of time during which the topology map 180 is to be generated. For example, a time window may describe a start time and an end time, in which the end time corresponds to a current time. As an additional example, a time window may describe a start time and a number of minutes after the start time or an end time and a number of minutes before the end time.
In some embodiments, the set of inputs also may include a set of filter parameters and/or a set of group by parameters. A set of filter parameters may identify a set of attributes by which compute instances of the distributed cloud environment may be filtered while a set of group by parameters may identify a set of attributes by which compute instances of the distributed cloud environment may be grouped in the topology map 180. A set of filter parameters and/or group by parameters allow different layers of network traffic to be visualized via the topology map 180. For example, based on a set of filter parameters, the topology map 180 may include different compute instances within one or more data centers 100 or within a single data center 100, in which the compute instances may be grouped by hostname, service, etc.
Attributes by which compute instances of the distributed cloud environment may be filtered and/or grouped may correspond to any arbitrary key-value pairs (e.g., IP addresses, hostnames, etc.) that may be associated with compute instances that have been stored in the configuration and discovery database 142 and merged into the enhanced time series data 116. In some embodiments, the attributes may correspond to tags (e.g., user-defined tags, such as a team name associated with a group of VMs in a data center 100 or hostnames, pod names, service names, VM names, etc. or portions thereof). Furthermore, in some embodiments, the attributes may overlap with each other. For example, compute instances of the distributed cloud environment may belong to the same data center 100, but belong to different environments (e.g., development and production).
Once the topology module 160 has received the set of inputs from the user station 170, the topology module 160 may query the enhanced time series data 116 stored in the multidimensional database 150 (in step 902) based on the set of inputs. The topology module 160 may then receive the query results (in step 904) and generate a user interface 175 including the topology map 180 based at least in part on the query results (in step 908). The topology map 180 may represent one or more compute instances of the distributed cloud environment (e.g., a collection of VMs in a team) as a node, while relationships between compute instances may be represented as links or edges, as further described below. Finally, the user interface 175 including the topology map 180 may then be displayed (in step 308).
One or more of the steps of
In some embodiments, compute instances of the distributed cloud environment may include external compute instances (e.g., remote or external clients and servers that do not include collectors 110 and which use external API services such as Google Auth®, Stripe®, and Salesforce®). In such embodiments, the external compute instances may be identified and grouped based on their behavior (in step 906). For example, based on similar types of database queries, similar types of URLs being accessed, etc., external compute instances may be grouped logically. As an additional example, external web servers running similar applications (e.g., a checkout application or a login application) may be grouped together. Behavior-based grouping of external compute instances is further described by an example algorithm which will now be discussed.
To illustrate an example of an algorithm that may be used to generate the topology map 180, the topology module 160 may construct a dynamic map of internal servers and clients (i.e., server and client instances that have collectors 110 installed), establish links from external clients to internal server nodes, and establish links from external servers to internal client nodes. The dynamic map of internal servers and clients may be constructed based on a set of results obtained by querying the enhanced time series data 116 using criteria that groups compute instances of the distributed cloud environment based on user-specified group by tags for servers and clients and tags obtained from user-specified filters for servers and clients and by filtering for servers and clients that are not remote and which are associated with user-specified filters. In this example, the topology module 160 may then establish links from external clients to internal servers by querying the enhanced time series data 116 using criteria that groups compute instances of the distributed cloud environment based on user-specified group by tags for servers and tags obtained from user-specified filters for servers and by filtering for server instances that are not remote and which are associated with user-specified filters and for client instances that are remote. Similarly, in this example, the topology module 160 may then establish links from external servers to internal clients by querying the enhanced time series data 116 using criteria that groups compute instances of the distributed cloud environment based on user-specified group by tags for clients and tags obtained from user-specified filters for clients and by filtering for server instances that are remote and for client instances that are not remote and which are associated with user-specified filters.
Continuing with the example of the algorithm, the topology module 160 may then update statistics for internal servers and clients with statistics for internal clients and servers that have been filtered out. The topology module 160 may update statistics for internal servers with statistics that belong to communication with internal clients that have been filtered out by querying the enhanced time series data 116 using criteria that groups compute instances of the distributed cloud environment based on user-specified group by tags for servers and tags obtained from user-specified filters for servers and by filtering for tags obtained from user-specified filters for servers and for client instances that do not have user-specified group by tags and are not remote. Similarly, the topology module 160 may then update statistics for internal clients with statistics that belong to communication with internal servers that have been filtered out by querying the enhanced time series data 116 using criteria that groups compute instances of the distributed cloud environment based on user-specified group by tags for clients and tags obtained from user-specified filters for clients and by filtering for tags obtained from user-specified filters for clients and for server instances that do not have user-specified group by tags and are not remote.
Continuing with the example of the algorithm, the topology module 160 may then automatically group remote server instances by determining a minimum set of resources (e.g., http.uri, mysql.query, memcached.command, etc.) that covers the entire set of server instances. For example, for HTTP, topology module 160 may query the enhanced time series data 116 to identify the top URIs based on requests/second, identify the instances covering those URIs and group them, giving a priority order to attribute a unique resource to a node. In this example, if a server is associated with both a MySQL and an HTTP resource, the topology module 160 gives priority to MySQL and attributes the server instance to a MySQL server. The topology module 160 then identifies internal server/client instances (e.g., pods, hosts, containers, etc.) not communicating with other compute instances of the distributed cloud environment and estimates the number of these instances by querying the enhanced time series data 116 for infrastructure metrics that are external to protocol reconstruction. The topology module 160 may query the enhanced time series data 116 to identify events indicating the health of the distributed cloud environment (e.g., critical events, warnings, lack of data, etc.) and overlays these events onto nodes within the topology map 180 if a group by filter for an alert matches the group by filter for the topology map 180.
As described above, one or more compute instances of the distributed cloud environment may be represented as a node, while relationships between compute instances may be represented as links or edges. For example, as shown in
As described above, in some embodiments, one or more of the steps of
As described above, once the topology module 160 has received the set of inputs from the user station 170, the topology module 160 may query the enhanced time series data 116 stored in the multidimensional database 150 (in step 902). To query the enhanced time series data 116, the topology module 160 may access the enhanced time series data 116 (e.g., by accessing the multidimensional database 150) (in step 1100) and identify a subset of the enhanced time series data 116 corresponding to the time window specified in the set of inputs (in step 1102). For example, if a time window specified in a set of inputs includes a start time of 10:00 AM on Mar. 28, 2018 and an end time corresponding to a current time, the topology module 160 may access the multidimensional database 150 and identify data points corresponding to each second between 10:00 AM on Mar. 28, 2018 and the current time. In embodiments in which the set of inputs does not include any filter or group by parameters, the subset of the enhanced time series data 116 identified by the topology module 160 may correspond to the query results that are received by the topology module 160 (in step 904).
In embodiments in which the set of inputs received by the topology module 160 include one or more filter and/or group by parameters, once the topology module 160 has identified a subset of the enhanced time series data 116 corresponding to the time window specified in the set of inputs, the topology module 160 may filter and/or group the subset of the enhanced time series data 116. The topology module 160 may filter the subset of the enhanced time series data 116 based on a set of attributes of compute instances of the distributed cloud environment specified in one or more filter parameters (in step 1104). Similarly, the topology module 160 also or alternatively may group the subset of the enhanced time series data 116 based on a set of attributes of compute instances of the distributed cloud environment specified in one or more group by parameters (in step 1106). In embodiments in which the topology module 160 filters and/or groups the subset of the enhanced time series data 116, the filtered and/or grouped enhanced time series data 116 may correspond to the query results that are received by the topology module 160 (in step 904).
Once a topology map 180 has been displayed (in step 308), a request to view a set of analytics for a node or a link within the topology map 180 may be received at the topology module 160 (in step 1200). Upon receiving the request, the topology module 160 may query the enhanced time series data 116 based at least in part on the request (e.g., by accessing the multidimensional database 150 and identifying a subset of the enhanced time series data 116 corresponding to the node/link) (in step 1202) and receive a set of query results corresponding to the subset of identified enhanced time series data 116 (in step 1204). In some embodiments, the topology module 160 also may identify the subset of the enhanced time series data 116 based on a set of inputs (e.g., a time window, one or more filter parameters and/or one or more group by parameters) used to generate the topology map 180. Then, the topology module 160 may generate a user interface 175 including analytics for the node/link (in step 1206) and display the user interface 175 including the analytics (in step 1208). In some embodiments, one or more of the steps of
As shown in
As shown in
With the above background information and problems with prior art in mind, certain embodiments of the present invention are related to a method and system for visual DevOps using real-time topology maps and real-time visualizations of various metrics for the logical service components in cloud applications.
For example, and without limitation, an embodiment of the invention, as shown and described by the various figures and accompanying text, provides a system and associated methods for Visual DevOps using a real-time topology map of logical service components as the foundation for building a converged SRE platform.
Referring now to
For example, and without limitation, the real-time topology map 1400 may provide universal observability into all the services making up an application, including both the internal and external API services. Services may be represented as vertices 1410 (or nodes) in the topology map and the interactions between the services may be represented as the edges 1420 (or arrows) connecting the vertices. Services may be of various types (for example, and without limitation, HTTP REST web service, MySQL database service, Memcached service, and DNS service).
Referring to
Referring to
Referring to
Another embodiment of the invention provides a system and associated methods for flexible and dynamic filtering, grouping, and sub-grouping of topology maps based on infrastructure tags and behavioral resources.
Referring to
An embodiment of the present invention is a system and associated methods for Visual DevOps using real-time visualizations of various key-performance indicators (KPIs) including service, network, and infrastructure level KPIs, for cloud applications.
Referring to
Referring to
Referring to
Embodiments of the present invention are described herein in the context of a system of computers, servers, and software. Those of ordinary skill in the art will realize that the embodiments of the present invention described above are provided as examples, and are not intended to be limiting in any way. Other embodiments of the present invention will readily suggest themselves to such skilled persons having the benefit of this disclosure.
System Architecture
A skilled artisan will note that one or more of the aspects of embodiments of the present invention may be performed on a computing device. The skilled artisan will also note that a computing device may be understood to be any device having a processor, memory unit, input, and output. This may include, but is not intended to be limited to, cellular phones, smart phones, tablet computers, laptop computers, desktop computers, personal digital assistants, etc.
The computer 2210 may also include a cryptographic unit 2225. Briefly, the cryptographic unit 2225 has a calculation function that may be used to verify digital signatures, calculate hashes, digitally scan hash values, and encrypt or decrypt data. The cryptographic unit 2225 may also have a protected memory for storing keys and other secret data. In other embodiments, the functions of the cryptographic unit may be instantiated in software and run via the operating system.
A computer 2210 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by a computer 2210 and includes both volatile and nonvolatile media and removable and non-removable media. By way of example, and not limitation, computer readable media may include computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, FLASH memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage, or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer 2210. Communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency, infrared, and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
The system memory 2230 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 2231 and random access memory (RAM) 2232. A basic input/output system 2233 (BIOS), containing the basic routines that help to transfer information between elements within computer 2210, such as during start-up, is typically stored in ROM 2231. RAM 2232 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 2220. By way of example, and not limitation,
The computer 2210 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media discussed above and illustrated in
A user may enter commands and information into the computer 2210 through input devices such as a keyboard 2262 and cursor control device 2261, commonly referred to as a mouse, trackball, or touch pad. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 2220 through a user input interface 2260 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port, or a universal serial bus (USB). A monitor 2291 or other type of display device is also connected to the system bus 2221 via an interface, such as a graphics controller 2290. In addition to the monitor, computers may also include other peripheral output devices such as speakers 2297 and printer 2296, which may be connected through an output peripheral interface 2295.
The computer 2210 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 2280. The remote computer 2280 may be a personal computer, a server, a router, a network PC, a peer device, or other common network node, and typically includes many or all of the elements described above relative to the computer 2210, although only a memory storage device 2281 has been illustrated in
When used in a LAN networking environment, the computer 2210 is connected to the LAN 2271 through a network interface or adapter 2270. When used in a WAN networking environment, the computer 2210 typically includes a modem 2272 or other means for establishing communications over the WAN 2273, such as the internet. The modem 2272, which may be internal or external, may be connected to the system bus 2221 via the user input interface 2260, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 2210, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
The communications connections 2270 and 2272 allow the device to communicate with other devices. The communications connections 2270 and 2272 are an example of communication media. The communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. A “modulated data signal” may be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared, and other wireless media. Computer readable media may include both storage media and communication media.
Some of the illustrative aspects of embodiments of the present invention may be advantageous in solving the problems herein described and other problems not discussed which are discoverable by a skilled artisan.
While the above description contains much specificity, these should not be construed as limitations on the scope of any embodiment, but as exemplifications of the presented embodiments thereof. Many other ramifications and variations are possible within the teachings of the various embodiments. While the invention has been described with reference to exemplary embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from the essential scope thereof. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed as the best or only mode contemplated for carrying out this invention, but that the invention will include all embodiments falling within the description of the invention. Also, in the drawings and the description, there have been disclosed exemplary embodiments of the invention and, although specific terms may have been employed, they are unless otherwise stated used in a generic and descriptive sense only and not for purposes of limitation, the scope of the invention therefore not being so limited. Moreover, the use of the terms first, second, etc. do not denote any order or importance, but rather the terms first, second, etc. are used to distinguish one element from another. Furthermore, the use of the terms a, an, etc. do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced item.
Gill, Tanveer Singh, Gill, Harjot Singh, Arnoux, Jacques, Nguyen, Cam Thi-Nguyet, Soundararajan, Saravana, Lu, Haolin, Nguyen, Anh Thi-Nguyet
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
10212041, | Mar 04 2016 | VMWARE, INC | Traffic pattern detection and presentation in container-based cloud computing architecture |
10693734, | Mar 04 2016 | VMWARE, INC | Traffic pattern detection and presentation in container-based cloud computing architecture |
6654803, | Jun 30 1999 | RPX CLEARINGHOUSE LLC | Multi-panel route monitoring graphical user interface, system and method |
7480866, | Aug 07 2001 | BMC Software, Inc. | Performance and flow analysis method for communication networks |
7668111, | Apr 11 2005 | Cisco Technology, Inc. | Determining traffic flow characteristics in a storage area network |
8031715, | May 12 2006 | Juniper Networks, Inc. | Network device having service card for dynamic flow capture and monitoring of packet flows |
8244853, | Mar 03 2003 | VMWARE, INC | Method and system for non intrusive application interaction and dependency mapping |
8533823, | May 21 2003 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | System and method for source IP anti-spoofing security |
8549518, | Aug 10 2011 | Nutanix, Inc | Method and system for implementing a maintenanece service for managing I/O and storage for virtualization environment |
8601473, | Aug 10 2011 | Nutanix, Inc | Architecture for managing I/O and storage for a virtualization environment |
8850130, | Aug 10 2011 | Nutanix, Inc | Metadata for managing I/O and storage for a virtualization |
9112715, | Oct 19 2001 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Method and system for intelligently forwarding multicast packets |
9450849, | Jul 24 2013 | Amazon Technologies, Inc | Trace backtracking in distributed systems |
9772866, | Jul 17 2012 | Nutanix, Inc | Architecture for implementing a virtualization environment and appliance |
20020013849, | |||
20020062359, | |||
20030217162, | |||
20090244067, | |||
20120275311, | |||
20120317072, | |||
20130246613, | |||
20140052841, | |||
20140304407, | |||
20150052441, | |||
20150156213, | |||
20150358391, | |||
20160087859, | |||
20160087860, | |||
20160127180, | |||
20160315821, | |||
20160359955, | |||
20170019487, | |||
20170024408, | |||
20170053008, | |||
20170085447, | |||
20170093645, | |||
20170329828, | |||
20180109602, | |||
20180248771, | |||
20190123970, | |||
20190190803, | |||
20190245769, | |||
20200250243, | |||
EP3104560, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Apr 25 2018 | Nutanix, Inc. | (assignment on the face of the patent) | / | |||
Jul 11 2018 | GILL, HARJOT SINGH | Nutanix, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049399 | /0689 | |
Jul 11 2018 | ARNOUX, JACQUES | Nutanix, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049399 | /0689 | |
Jul 11 2018 | LU, HAOLIN | Nutanix, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049399 | /0689 | |
Jul 11 2018 | NGUYEN, ANH THI-NGUYET | Nutanix, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049399 | /0689 | |
Jul 12 2018 | GILL, TANVEER SINGH | Nutanix, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049399 | /0689 | |
Jul 17 2018 | NGUYEN, CAM THI-NGUYET | Nutanix, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049399 | /0689 | |
Jul 24 2018 | SOUNDARARAJAN, SARAVANA | Nutanix, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049399 | /0689 |
Date | Maintenance Fee Events |
Apr 25 2018 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Dec 26 2026 | 4 years fee payment window open |
Jun 26 2027 | 6 months grace period start (w surcharge) |
Dec 26 2027 | patent expiry (for year 4) |
Dec 26 2029 | 2 years to revive unintentionally abandoned end. (for year 4) |
Dec 26 2030 | 8 years fee payment window open |
Jun 26 2031 | 6 months grace period start (w surcharge) |
Dec 26 2031 | patent expiry (for year 8) |
Dec 26 2033 | 2 years to revive unintentionally abandoned end. (for year 8) |
Dec 26 2034 | 12 years fee payment window open |
Jun 26 2035 | 6 months grace period start (w surcharge) |
Dec 26 2035 | patent expiry (for year 12) |
Dec 26 2037 | 2 years to revive unintentionally abandoned end. (for year 12) |